-
On solvable complete symplectic Lie algebras
Authors:
M. Benyoussef,
M. W. Mansouri,
SM. Sbai
Abstract:
In this paper, we are interested in solvable complete Lie algebras, over the field $\K=\R$ or $\mathbb{C}$, which admit a symplectic structure. Specifically, important classes are studied, and a description of complete Lie Algebra with the dimension of nilradical less or equal than six, which supported symplectic structure is given.
In this paper, we are interested in solvable complete Lie algebras, over the field $\K=\R$ or $\mathbb{C}$, which admit a symplectic structure. Specifically, important classes are studied, and a description of complete Lie Algebra with the dimension of nilradical less or equal than six, which supported symplectic structure is given.
△ Less
Submitted 28 June, 2024; v1 submitted 26 June, 2024;
originally announced June 2024.
-
LLM-Driven Robots Risk Enacting Discrimination, Violence, and Unlawful Actions
Authors:
Rumaisa Azeem,
Andrew Hundt,
Masoumeh Mansouri,
Martim Brandão
Abstract:
Members of the Human-Robot Interaction (HRI) and Artificial Intelligence (AI) communities have proposed Large Language Models (LLMs) as a promising resource for robotics tasks such as natural language interactions, doing household and workplace tasks, approximating `common sense reasoning', and modeling humans. However, recent research has raised concerns about the potential for LLMs to produce di…
▽ More
Members of the Human-Robot Interaction (HRI) and Artificial Intelligence (AI) communities have proposed Large Language Models (LLMs) as a promising resource for robotics tasks such as natural language interactions, doing household and workplace tasks, approximating `common sense reasoning', and modeling humans. However, recent research has raised concerns about the potential for LLMs to produce discriminatory outcomes and unsafe behaviors in real-world robot experiments and applications. To address these concerns, we conduct an HRI-based evaluation of discrimination and safety criteria on several highly-rated LLMs. Our evaluation reveals that LLMs currently lack robustness when encountering people across a diverse range of protected identity characteristics (e.g., race, gender, disability status, nationality, religion, and their intersections), producing biased outputs consistent with directly discriminatory outcomes -- e.g. `gypsy' and `mute' people are labeled untrustworthy, but not `european' or `able-bodied' people. Furthermore, we test models in settings with unconstrained natural language (open vocabulary) inputs, and find they fail to act safely, generating responses that accept dangerous, violent, or unlawful instructions -- such as incident-causing misstatements, taking people's mobility aids, and sexual predation. Our results underscore the urgent need for systematic, routine, and comprehensive risk assessments and assurances to improve outcomes and ensure LLMs only operate on robots when it is safe, effective, and just to do so. Data and code will be made available.
△ Less
Submitted 13 June, 2024;
originally announced June 2024.
-
Holographic complex potential of a quarkonium from deep learning
Authors:
Mahdi Mansouri,
Kazem Bitaghsir Fadafan,
Xun Chen
Abstract:
Utilizing an emergent metric developed from deep learning techniques, we determine the complex potential associated with static quarkonium. This study explores the disintegration process of quarkonium by analyzing the real component of this potential, which is crucial for understanding its stability in various conditions. We show that the dissociation length, the critical distance at which a quark…
▽ More
Utilizing an emergent metric developed from deep learning techniques, we determine the complex potential associated with static quarkonium. This study explores the disintegration process of quarkonium by analyzing the real component of this potential, which is crucial for understanding its stability in various conditions. We show that the dissociation length, the critical distance at which a quark and antiquark pair disintegrate, decreases as the temperature increases. Furthermore, our assessment of the imaginary component of the potential indicates an increase in the magnitude of the imaginary potential for quarkonium as temperatures rise. This enhancement contributes to the quarkonium's suppression within the quark-gluon plasma, mirroring the anticipated outcomes from QCD. Our findings not only confirm the theoretical predictions but also demonstrate the efficacy of deep learning methods in advancing our understanding of high-energy particle physics.
△ Less
Submitted 10 June, 2024;
originally announced June 2024.
-
Lithium Borohydride (LiBH4): An Innovative Material for Neutron Radiation Shielding
Authors:
Mohammadreza Lotfalian,
Mitra Athari Allaf,
Masoud Mansouri
Abstract:
Radiation shielding plays a crucial role in various industries, including nuclear and space exploration. Among the most abundant elements and isotopes found in nature, 10B has one of the highest neutron absorption cross-sections, closely followed by 6Li. It is worth noting that hydrogen, with its light nucleus, serves as an excellent neutron reflector. Surprisingly, the potential of the lithium bo…
▽ More
Radiation shielding plays a crucial role in various industries, including nuclear and space exploration. Among the most abundant elements and isotopes found in nature, 10B has one of the highest neutron absorption cross-sections, closely followed by 6Li. It is worth noting that hydrogen, with its light nucleus, serves as an excellent neutron reflector. Surprisingly, the potential of the lithium borohydride molecule (LiBH4), which consists exclusively of these elements, as a shield against neutron radiation has not yet been explored. This study investigates various materials that can potentially be used as shields. First, we assessed traditional shields and previous optimizations for shielding. The findings showed that concrete containing 10% B4C yielded the best results. High-performance concrete (HPC) replaced regular concrete. By gradually incorporating lithium borohydride into the shield, along with the appropriate level of boron carbide, further optimization was achieved. Calculations were performed using the MCNPX 2.7E code. The introduction of the new shield resulted in a significant 40% reduction in volume compared with the previous sample. The study findings showed that a 30 cm thick shield effectively blocked 95% of the total neutrons and 92% of the total gamma radiation. Additionally, it was noted that the shielding effects of lithium borohydride against fast neutrons are greater than those of boron carbide. Various parameters and data of the designed shield were calculated and compared with those of the previous sample.
△ Less
Submitted 5 June, 2024;
originally announced June 2024.
-
Cosymplectic Jacobi-Jordan Algebras
Authors:
S. El bourkadi,
M. W. Mansouri
Abstract:
We introduce the notion of cosymplectic structure on Jacobi-Jordan algebras, and we state that they are related to symplectic Jacobi-Jordan algebras. We show, in particular, that they support a right-skew-symmetric product. We also study the double extension constructions of cosymplectic Jacobi-Jordan algebras and give a complete classification in dimension five.
We introduce the notion of cosymplectic structure on Jacobi-Jordan algebras, and we state that they are related to symplectic Jacobi-Jordan algebras. We show, in particular, that they support a right-skew-symmetric product. We also study the double extension constructions of cosymplectic Jacobi-Jordan algebras and give a complete classification in dimension five.
△ Less
Submitted 29 April, 2024;
originally announced May 2024.
-
Balanced Hermitian structures on twisted cartesian products
Authors:
M. W. Mansouri,
A. Oufkou
Abstract:
We study Hermitian structures on twisted cartesian products $(\mathfrak{g}_{(ρ_{1},ρ_{2})},\mathrm{J},\cal{K})$ of two Hermitian Lie algebras according to two representations $ρ_{1}$ and $ρ_{2}$. We give the conditions on $(\mathfrak{g}_{(ρ_{1},ρ_{2})},\mathrm{J},\cal{K})$ to be balanced and locally conformally balanced. As an application we classify six-dimensional balanced Hermitian twisted cart…
▽ More
We study Hermitian structures on twisted cartesian products $(\mathfrak{g}_{(ρ_{1},ρ_{2})},\mathrm{J},\cal{K})$ of two Hermitian Lie algebras according to two representations $ρ_{1}$ and $ρ_{2}$. We give the conditions on $(\mathfrak{g}_{(ρ_{1},ρ_{2})},\mathrm{J},\cal{K})$ to be balanced and locally conformally balanced. As an application we classify six-dimensional balanced Hermitian twisted cartesian products Lie algebras.
△ Less
Submitted 20 February, 2024;
originally announced February 2024.
-
A complete classification of symplectic forms on six-dimensional Frobeniusian real Lie algebras
Authors:
T. Aït Aissa,
S. Elbourkadi,
M. W. Mansouri
Abstract:
In this paper, we give a complete classification of symplectic structures on six-dimensional Frobeniusian solvable Lie algebras, up to symplectomorphism. We provide a scheme to classify the isomorphism classes of six-dimensional Frobeniusian solvable Lie algebras whose exact form has a Lagrangian ideal. We complete our classification by considering Frobeniusian solvable Lie algebras without Lagran…
▽ More
In this paper, we give a complete classification of symplectic structures on six-dimensional Frobeniusian solvable Lie algebras, up to symplectomorphism. We provide a scheme to classify the isomorphism classes of six-dimensional Frobeniusian solvable Lie algebras whose exact form has a Lagrangian ideal. We complete our classification by considering Frobeniusian solvable Lie algebras without Lagrangian ideal.
△ Less
Submitted 1 February, 2024;
originally announced February 2024.
-
Formal Modelling for Multi-Robot Systems Under Uncertainty
Authors:
Charlie Street,
Masoumeh Mansouri,
Bruno Lacerda
Abstract:
Purpose of Review: To effectively synthesise and analyse multi-robot behaviour, we require formal task-level models which accurately capture multi-robot execution. In this paper, we review modelling formalisms for multi-robot systems under uncertainty, and discuss how they can be used for planning, reinforcement learning, model checking, and simulation.
Recent Findings: Recent work has investiga…
▽ More
Purpose of Review: To effectively synthesise and analyse multi-robot behaviour, we require formal task-level models which accurately capture multi-robot execution. In this paper, we review modelling formalisms for multi-robot systems under uncertainty, and discuss how they can be used for planning, reinforcement learning, model checking, and simulation.
Recent Findings: Recent work has investigated models which more accurately capture multi-robot execution by considering different forms of uncertainty, such as temporal uncertainty and partial observability, and modelling the effects of robot interactions on action execution. Other strands of work have presented approaches for reducing the size of multi-robot models to admit more efficient solution methods. This can be achieved by decoupling the robots under independence assumptions, or reasoning over higher level macro actions.
Summary: Existing multi-robot models demonstrate a trade off between accurately capturing robot dependencies and uncertainty, and being small enough to tractably solve real world problems. Therefore, future research should exploit realistic assumptions over multi-robot behaviour to develop smaller models which retain accurate representations of uncertainty and robot interactions; and exploit the structure of multi-robot problems, such as factored state spaces, to develop scalable solution methods.
△ Less
Submitted 15 August, 2023; v1 submitted 26 May, 2023;
originally announced May 2023.
-
Design and Control of a Ballbot Drivetrain with High Agility, Minimal Footprint, and High Payload
Authors:
Chenzhang Xiao,
Mahshid Mansouri,
David Lam,
Joao Ramos,
Elizabeth T. Hsiao-Wecksler
Abstract:
This paper presents the design and control of a ballbot drivetrain that aims to achieve high agility, minimal footprint, and high payload capacity while maintaining dynamic stability. Two hardware platforms and analytical models were developed to test design and control methodologies. The full-scale ballbot prototype (MiaPURE) was constructed using off-the-shelf components and designed to have agi…
▽ More
This paper presents the design and control of a ballbot drivetrain that aims to achieve high agility, minimal footprint, and high payload capacity while maintaining dynamic stability. Two hardware platforms and analytical models were developed to test design and control methodologies. The full-scale ballbot prototype (MiaPURE) was constructed using off-the-shelf components and designed to have agility, footprint, and balance similar to that of a walking human. The planar inverted pendulum testbed (PIPTB) was developed as a reduced-order testbed for quick validation of system performance. We then proposed a simple yet robust LQR-PI controller to balance and maneuver the ballbot drivetrain with a heavy payload. This is crucial because the drivetrain is often subject to high stiction due to elastomeric components in the torque transmission system. This controller was first tested in the PIPTB to compare with traditional LQR and cascaded PI-PD controllers, and then implemented in the ballbot drivetrain. The MiaPURE drivetrain was able to carry a payload of 60 kg, achieve a maximum speed of 2.3 m/s, and come to a stop from a speed of 1.4 m/s in 2 seconds in a selected translation direction. Finally, we demonstrated the omnidirectional movement of the ballbot drivetrain in an indoor environment as a payload-carrying robot and a human-riding mobility device. Our experiments demonstrated the feasibility of using the ballbot drivetrain as a universal mobility platform with agile movements, minimal footprint, and high payload capacity using our proposed design and control methodologies.
△ Less
Submitted 6 April, 2023;
originally announced April 2023.
-
Eight-dimensional symplectic non-solvable Lie algebras
Authors:
T. Aït Aissa,
M. W. Mansouri
Abstract:
In this paper, we classify eight-dimensional non-solvable Lie algebras that support a symplectic structure. As well as a complete classification is given, up to symplectomorphism, of eight-dimensional symplectic non-solvable Lie algebras.
In this paper, we classify eight-dimensional non-solvable Lie algebras that support a symplectic structure. As well as a complete classification is given, up to symplectomorphism, of eight-dimensional symplectic non-solvable Lie algebras.
△ Less
Submitted 19 May, 2023; v1 submitted 24 October, 2022;
originally announced October 2022.
-
On cosymplectic Lie Algebras
Authors:
S. El bourkadi,
M. W. Mansouri
Abstract:
We give some properties of cosymplectic Lie algebras, we show, in particular, that they support a left symmetric product. We also give some constructions of cosymplectic Lie algebras, as well as a classification in three and five-dimensional cosymplectic Lie algebras.
We give some properties of cosymplectic Lie algebras, we show, in particular, that they support a left symmetric product. We also give some constructions of cosymplectic Lie algebras, as well as a classification in three and five-dimensional cosymplectic Lie algebras.
△ Less
Submitted 8 June, 2022; v1 submitted 4 April, 2022;
originally announced April 2022.
-
Quantum tunneling in graphene Corbino disk in a solenoid magnetic potential with wedge disclination
Authors:
Ahmed Bouhlal,
Ahmed Jellal,
Mohamed Mansouri
Abstract:
We investigate the wedge disclination effect on quantum tunneling of a Corbino disk in gapped-graphene of inner $R_1$ and outer $R_2$ radii in the presence of magnetic flux $Φ_i$. We solve Dirac equation for different regions and obtain the solutions of energy spectrum in terms of Hankel functions. The asymptotic behaviors for large arguments allow us to determine the transmission, Fano factor and…
▽ More
We investigate the wedge disclination effect on quantum tunneling of a Corbino disk in gapped-graphene of inner $R_1$ and outer $R_2$ radii in the presence of magnetic flux $Φ_i$. We solve Dirac equation for different regions and obtain the solutions of energy spectrum in terms of Hankel functions. The asymptotic behaviors for large arguments allow us to determine the transmission, Fano factor and conductance. We establish the case where the crystal symmetry is modified locally by replacing a hexagon by pentagon, square, heptagon or octagon. We show that the wedge disclination $n$ modifies the amplitude of transmission oscillations. We find that the period of Fano factor oscillations is of the Aharonov-Bohm type, which strongly depends on $n$ where intense peaks are observed. As another result, $n$ changes the minimum and period of conductance oscillations of the Aharonov-Bohm type. We show that $n$ minimizes the effect of resonance and decreases the amplitude of conductance magnitude $ΔG$
oscillations.
△ Less
Submitted 2 February, 2022;
originally announced February 2022.
-
Role of Artificial Intelligence, Clinicians & Policymakers in Clinical Decision Making: A Systems Viewpoint
Authors:
Avishek Choudhury,
Onur Asan,
Mo Mansouri
Abstract:
What is a system? Is one of those questions that is yet not clear to most individuals in this world. A system is an assemblage of interacting, interrelated and interdependent components forming a complex and integrated whole with an unambiguous and common goal. This paper emphasizes on the fact that all components of a complex system are inter-related and interdependent in some way and the behavio…
▽ More
What is a system? Is one of those questions that is yet not clear to most individuals in this world. A system is an assemblage of interacting, interrelated and interdependent components forming a complex and integrated whole with an unambiguous and common goal. This paper emphasizes on the fact that all components of a complex system are inter-related and interdependent in some way and the behavior of that system depends on these independences. A health care system as portrayed in this article is widespread and complex. This encompasses not only hospitals but also governing bodies like the FDA, technologies such as AI, biomedical devices, Cloud computing and many more. The interactions between all these components govern the behavior and existence of the overall healthcare system. In this paper, we focus on the interaction of artificial intelligence, care providers and policymakers and analyze using systems thinking approach, their impact on clinical decision making
△ Less
Submitted 31 October, 2021;
originally announced December 2021.
-
Central Kurdish machine translation: First large scale parallel corpus and experiments
Authors:
Zhila Amini,
Mohammad Mohammadamini,
Hawre Hosseini,
Mehran Mansouri,
Daban Jaff
Abstract:
While the computational processing of Kurdish has experienced a relative increase, the machine translation of this language seems to be lacking a considerable body of scientific work. This is in part due to the lack of resources especially curated for this task. In this paper, we present the first large scale parallel corpus of Central Kurdish-English, Awta, containing 229,222 pairs of manually al…
▽ More
While the computational processing of Kurdish has experienced a relative increase, the machine translation of this language seems to be lacking a considerable body of scientific work. This is in part due to the lack of resources especially curated for this task. In this paper, we present the first large scale parallel corpus of Central Kurdish-English, Awta, containing 229,222 pairs of manually aligned translations. Our corpus is collected from different text genres and domains in an attempt to build more robust and real-world applications of machine translation. We make a portion of this corpus publicly available in order to foster research in this area. Further, we build several neural machine translation models in order to benchmark the task of Kurdish machine translation. Additionally, we perform extensive experimental analysis of results in order to identify the major challenges that Central Kurdish machine translation faces. These challenges include language-dependent and-independent ones as categorized in this paper, the first group of which are aware of Central Kurdish linguistic properties on different morphological, syntactic and semantic levels. Our best performing systems achieve 22.72 and 16.81 in BLEU score for Ku$\rightarrow$EN and En$\rightarrow$Ku, respectively.
△ Less
Submitted 17 June, 2021;
originally announced June 2021.
-
Left invariant generalized complex and Kähler structures on simply connected four dimensional Lie groups: classification and invariant cohomologies
Authors:
Mohamed Boucetta,
Mohammed Wadia Mansouri
Abstract:
We give a complete classification of left invariant generalized complex structures of type 1 on four dimensional simply connected Lie groups and we compute for each class its invariant generalized Dolbeault cohomology, its invariant generalized Bott-Chern cohomology and its invariant generalized Aeppli cohomology. We classify also left invariant generalized Kähler structures on four dimensional si…
▽ More
We give a complete classification of left invariant generalized complex structures of type 1 on four dimensional simply connected Lie groups and we compute for each class its invariant generalized Dolbeault cohomology, its invariant generalized Bott-Chern cohomology and its invariant generalized Aeppli cohomology. We classify also left invariant generalized Kähler structures on four dimensional simply connected Lie groups.
△ Less
Submitted 14 July, 2020;
originally announced July 2020.
-
Counting Phylogenetic Networks with Few Reticulation Vertices: Exact Enumeration and Corrections
Authors:
Michael Fuchs,
Bernhard Gittenberger,
Marefatollah Mansouri
Abstract:
In previous work, we gave asymptotic counting results for the number of tree-child and normal networks with $k$ reticulation vertices and explicit exponential generating functions of the counting sequences for $k=1,2,3$. The purpose of this note is two-fold. First, we make some corrections to our previous approach which overcounted the above numbers and thus gives erroneous exponential generating…
▽ More
In previous work, we gave asymptotic counting results for the number of tree-child and normal networks with $k$ reticulation vertices and explicit exponential generating functions of the counting sequences for $k=1,2,3$. The purpose of this note is two-fold. First, we make some corrections to our previous approach which overcounted the above numbers and thus gives erroneous exponential generating functions (however, the overcounting does not effect our asymptotic counting results). Secondly, we use our (corrected) exponential generating functions to derive explicit formulas for the number of tree-child and normal networks with $k=1,2,3$ reticulation vertices. This re-derives recent results of Carona and Zhang, answers their question for normal networks with $k=2$, and adds new formulas in the case $k=3$.
△ Less
Submitted 3 March, 2021; v1 submitted 28 June, 2020;
originally announced June 2020.
-
Counting General Phylogenetic networks
Authors:
Marefatollah Mansouri
Abstract:
We provide precise asymptotic estimates for the number of general phylogenetic networks by using analytic combinatorial methods. Recently, this approach is studied by Fuchs, Gittenberger, and the author himself (Australasian Journal of Combinatorics 73(2):385-423, 2019), to count networks with few reticulation vertices for two subclasses: tree-child and normal networks. We follow this line of rese…
▽ More
We provide precise asymptotic estimates for the number of general phylogenetic networks by using analytic combinatorial methods. Recently, this approach is studied by Fuchs, Gittenberger, and the author himself (Australasian Journal of Combinatorics 73(2):385-423, 2019), to count networks with few reticulation vertices for two subclasses: tree-child and normal networks. We follow this line of research to show how to obtain results on the enumeration of general phylogenetic networks.
△ Less
Submitted 27 May, 2020;
originally announced May 2020.
-
Counting Phylogenetic Networks of level 1 and 2
Authors:
Mathilde Bouvel,
Philippe Gambette,
Marefatollah Mansouri
Abstract:
Phylogenetic networks generalize phylogenetic trees, and have been introduced in order to describe evolution in the case of transfer of genetic material between coexisting species. There are many classes of phylogenetic networks, which can all be modeled as families of graphs with labeled leaves. In this paper, we focus on rooted and unrooted level-k networks and provide enumeration formulas (exac…
▽ More
Phylogenetic networks generalize phylogenetic trees, and have been introduced in order to describe evolution in the case of transfer of genetic material between coexisting species. There are many classes of phylogenetic networks, which can all be modeled as families of graphs with labeled leaves. In this paper, we focus on rooted and unrooted level-k networks and provide enumeration formulas (exact and asymptotic) for rooted and unrooted level-1 and level-2 phylogenetic networks with a given number of leaves. We also prove that the distribution of some parameters of these networks (such as their number of cycles) are asymptotically normally distributed. These results are obtained by first providing a recursive description (also called combinatorial specification) of our networks, and by next applying classical methods of enumerative, symbolic and analytic combinatorics.
△ Less
Submitted 11 March, 2020; v1 submitted 23 September, 2019;
originally announced September 2019.
-
Sum Capacity Bounds and Design of Suboptimal Codes for Asynchronous CDMA Systems
Authors:
Shayan Dashmiz,
Seyed Mohammad Mansouri,
Amir Najafi,
Farrokh Marvasti
Abstract:
In this paper, we study two issues in asynchronous communication systems. The first issue is the derivation of sum capacity bounds for finite dimensional asynchronous systems. In addition, asymptotic results for the sum capacity bounds are obtained. The second issue is the design of practical suboptimal codes for binary chip asynchronous CDMA systems that become optimal for high Signal-to-Noise (S…
▽ More
In this paper, we study two issues in asynchronous communication systems. The first issue is the derivation of sum capacity bounds for finite dimensional asynchronous systems. In addition, asymptotic results for the sum capacity bounds are obtained. The second issue is the design of practical suboptimal codes for binary chip asynchronous CDMA systems that become optimal for high Signal-to-Noise (SNR) ratios. The performance of such suboptimal codes is also compared to Gold and Optical Orthogonal codes. The conclusion is that the proposed suboptimal codes perform favorably compared to other known codes for high SNR asynchronous systems and perform more or less the same as the other codes for the low SNR values.
△ Less
Submitted 17 March, 2019;
originally announced March 2019.
-
Approximation of subsets of natural numbers by c.e. sets
Authors:
Mohsen Mansouri,
Farzad Didehvar
Abstract:
The approximation of natural numbers subsets has always been one of the fundamental issues in computability theory. Computable approximation, $Δ_2$-approximation, as well as introducing the generically computable sets have been some efforts for this purpose. In this paper, a type of approximation for natural numbers subsets by computably enumerable sets will be examined. For an infinite and non-c.…
▽ More
The approximation of natural numbers subsets has always been one of the fundamental issues in computability theory. Computable approximation, $Δ_2$-approximation, as well as introducing the generically computable sets have been some efforts for this purpose. In this paper, a type of approximation for natural numbers subsets by computably enumerable sets will be examined. For an infinite and non-c.e set, $W_i$ will be an $A$.maximal (maximal inside $A$) if $W_i \subseteq A$, is infinite and $\forall j (W_i \subseteq W_j \subseteq A) \to Δ(W_i, W_j )< \infty$, where $Δ$ is the symmetric difference of the two sets. In this study, the natural numbers subsets will be examined from the maximal subset contents point of view, and we will categorize them on this basis. We will study c.regular sets that are non-c.e. and include a maximal set inside themselves, and c.irregular sets that are non-c.e. and non-immune sets which do not include maximal sets. Finally, we study the graph of relationship between c.e. subsets of c.irregular sets.
△ Less
Submitted 9 February, 2019;
originally announced February 2019.
-
A Constraint Programming Approach to Simultaneous Task Allocation and Motion Scheduling for Industrial Dual-Arm Manipulation Tasks
Authors:
Jan Kristof Behrens,
Ralph Lange,
Masoumeh Mansouri
Abstract:
Modern lightweight dual-arm robots bring the physical capabilities to quickly take over tasks at typical industrial workplaces designed for workers. In times of mass-customization, low setup times including the instructing/specifying of new tasks are crucial to stay competitive. We propose a constraint programming approach to simultaneous task allocation and motion scheduling for such industrial m…
▽ More
Modern lightweight dual-arm robots bring the physical capabilities to quickly take over tasks at typical industrial workplaces designed for workers. In times of mass-customization, low setup times including the instructing/specifying of new tasks are crucial to stay competitive. We propose a constraint programming approach to simultaneous task allocation and motion scheduling for such industrial manipulation and assembly tasks. The proposed approach covers dual-arm and even multi-arm robots as well as connected machines. The key concept are Ordered Visiting Constraints, a descriptive and extensible model to specify such tasks with their spatiotemporal requirements and task-specific combinatorial or ordering constraints. Our solver integrates such task models and robot motion models into constraint optimization problems and solves them efficiently using various heuristics to produce makespan-optimized robot programs. The proposed task model is robot independent and thus can easily be deployed to other robotic platforms. Flexibility and portability of our proposed model is validated through several experiments on different simulated robot platforms. We benchmarked our search strategy against a general-purpose heuristic. For large manipulation tasks with 200 objects, our solver implemented using Google's Operations Research tools and ROS requires less than a minute to compute usable plans.
△ Less
Submitted 23 January, 2019;
originally announced January 2019.
-
An Influence-based Clustering Model on Twitter
Authors:
Abbas Ehsanfar,
Mo Mansouri
Abstract:
This paper introduces a temporal framework for detecting and clustering emergent and viral topics on social networks. Endogenous and exogenous influence on developing viral content is explored using a clustering method based on the a user's behavior on social network and a dataset from Twitter API. Results are discussed by introducing metrics such as popularity, burstiness, and relevance score. Th…
▽ More
This paper introduces a temporal framework for detecting and clustering emergent and viral topics on social networks. Endogenous and exogenous influence on developing viral content is explored using a clustering method based on the a user's behavior on social network and a dataset from Twitter API. Results are discussed by introducing metrics such as popularity, burstiness, and relevance score. The results show clear distinction in characteristics of developed content by the two classes of users.
△ Less
Submitted 19 November, 2018;
originally announced November 2018.
-
Incentivizing the Dissemination of Truth Versus Fake News in Social Networks
Authors:
Abbas Ehsanfar,
Mo Mansouri
Abstract:
The concept of truth, as a public good is the production of a collective understanding, which emerges from a complex network of social interactions. The recent impact of social networks on shaping the perception of truth in political arena shows how such perception is corroborated and established by the online users, collectively. However, investigative journalism for discovering truth is a costly…
▽ More
The concept of truth, as a public good is the production of a collective understanding, which emerges from a complex network of social interactions. The recent impact of social networks on shaping the perception of truth in political arena shows how such perception is corroborated and established by the online users, collectively. However, investigative journalism for discovering truth is a costly option, given the vast spectrum of online information. In some cases, both journalist and online users choose not to investigate the authenticity of the news they receive, because they assume other actors of the network had carried the cost of validation. Therefore, the new phenomenon of "fake news" has emerged within the context of social networks. The online social networks, similarly to System of Systems, cause emergent properties, which makes authentication processes difficult, given availability of multiple sources. In this study, we show how this conflict can be modeled as a volunteer's dilemma. We also show how the public contribution through news subscription (shared rewards) can impact the dominance of truth over fake news in the network.
△ Less
Submitted 7 April, 2018;
originally announced April 2018.
-
Counting Phylogenetic Networks with Few Reticulation Vertices: Tree-Child and Normal Networks
Authors:
Michael Fuchs,
Bernhard Gittenberger,
Marefatollah Mansouri
Abstract:
In recent decades, phylogenetic networks have become a standard tool in modeling evolutionary processes. Nevertheless, basic combinatorial questions about them are still largely open. For instance, even the asymptotic counting problem for the class of phylogenetic networks and subclasses is unsolved. In this paper, we propose a method based on generating functions to count networks with few reticu…
▽ More
In recent decades, phylogenetic networks have become a standard tool in modeling evolutionary processes. Nevertheless, basic combinatorial questions about them are still largely open. For instance, even the asymptotic counting problem for the class of phylogenetic networks and subclasses is unsolved. In this paper, we propose a method based on generating functions to count networks with few reticulation vertices for two subclasses which are important in applications: tree-child networks and normal networks. In particular, our method can be used to completely solve the asymptotic counting problem for these network classes when the number of reticulation vertices remains fixed and the network size tends to infinity.
△ Less
Submitted 9 November, 2018; v1 submitted 29 March, 2018;
originally announced March 2018.
-
How much could we cover a set by c.e sets?
Authors:
Farzad Didehvar,
Mohsen Mansouri,
Zahra Taheri
Abstract:
"How much c.e. sets could cover a given set?" in this paper we are going to answer this question. Also, in this approach some old concepts come into a new arrangement. The major goal of this article is to introduce an appropriate definition for this purpose. Introduction In Computability Theory (Recursion Theory) in the first step we wish to recognize the sets which could be enumerated by Turing m…
▽ More
"How much c.e. sets could cover a given set?" in this paper we are going to answer this question. Also, in this approach some old concepts come into a new arrangement. The major goal of this article is to introduce an appropriate definition for this purpose. Introduction In Computability Theory (Recursion Theory) in the first step we wish to recognize the sets which could be enumerated by Turing machines (equivalently, algorithms) and in the next step we will compare these sets by some reasonable order (Like Turing degree). Also sometimes with some extra information (Oracles) a class of non c.e. sets show the same behavior as c.e. sets (Post hierarchy and related theorems). Here we try another approach: "Let A be an arbitrary set and we wish to recognize how much this set might be covered by a c.e. set?" Although in some sense this approach could be seen in some definitions of Recursion Theory, but at the best of our knowledge it didn't considered as an approach yet, even though it is able to shed a light on some subjects of Computability of sets. Defining this approach is not quite straightforward and there are some obstacles to define them. To overcome these difficulties we modify the definitions. We have an alternative problem here when we consider recursive sets and not c.e. sets. In this case, the problem would be: "Let A be an arbitrary set and we wish to know that how much this set might be covered by a recursive Set?" Here, we try the first definition and the first problem.
△ Less
Submitted 5 March, 2012;
originally announced March 2012.
-
The Enigma of CDMA Revisited
Authors:
K. Alishahi,
S. Dashmiz,
P. Pad,
F. Marvasti,
M. H. Shafinia,
M. Mansouri
Abstract:
In this paper, we explore the mystery of synchronous CDMA as applied to wireless and optical communication systems under very general settings for the user symbols and the signature matrix entries. The channel is modeled with real/complex additive noise of arbitrary distribution. Two problems are addressed. The first problem concerns whether overloaded error free codes exist in the absence of addi…
▽ More
In this paper, we explore the mystery of synchronous CDMA as applied to wireless and optical communication systems under very general settings for the user symbols and the signature matrix entries. The channel is modeled with real/complex additive noise of arbitrary distribution. Two problems are addressed. The first problem concerns whether overloaded error free codes exist in the absence of additive noise under these general settings, and if so whether there are any practical optimum decoding algorithms. The second one is about the bounds for the sum channel capacity when user data and signature codes employ any real or complex alphabets (finite or infinite). In response to the first problem, we have developed practical Maximum Likelihood (ML) decoding algorithms for overloaded CDMA systems for a large class of alphabets. In response to the second problem, a general theorem has been developed in which the sum capacity lower bounds with respect to the number of users and spreading gain and Signal-to-Noise Ratio (SNR) can be derived as special cases for a given CDMA system. To show the power and utility of the main theorem, a number of sum capacity bounds for special cases are simulated. An important conclusion of this paper is that the lower and upper bounds of the sum capacity for small/medium size CDMA systems depend on both the input and the signature symbols; this is contrary to the asymptotic results for large scale systems reported in the literature (also confirmed in this paper) where the signature symbols and statistics disappear in the asymptotic sum capacity. Moreover, these questions are investigated for the case when not all users are active. Furthermore, upper and asymptotic bounds are derived and numerically evaluated and compared to other derivations.
△ Less
Submitted 5 May, 2010;
originally announced May 2010.
-
Bounds for the Sum Capacity of Binary CDMA Systems in Presence of Near-Far Effect
Authors:
P. Pad,
M. H. Shafinia,
S. M. Mansouri,
P. Kabir,
F. Marvasti
Abstract:
In this paper we are going to estimate the sum capacity of a binary CDMA system in presence of the near-far effect. We model the near-far effect as a random variable that is multiplied by the users binary data before entering the noisy channel. We will find a lower bound and a conjectured upper bound for the sum capacity in this situation. All the derivations are in the asymptotic case. Simulation…
▽ More
In this paper we are going to estimate the sum capacity of a binary CDMA system in presence of the near-far effect. We model the near-far effect as a random variable that is multiplied by the users binary data before entering the noisy channel. We will find a lower bound and a conjectured upper bound for the sum capacity in this situation. All the derivations are in the asymptotic case. Simulations show that especially the lower bound is very tight for typical values Eb/N0 and near-far effect. Also, we exploit our idea in conjunction with the Tanaka's formula [6] which also estimates the sum capacity of binary CDMA systems with perfect power control.
△ Less
Submitted 28 March, 2010;
originally announced March 2010.
-
A Decrumpling Model of the Universe
Authors:
M. Khorrami,
M. Mansouri,
M. Mohazzab
Abstract:
Assuming a cellular structure for the space-time, we propose a model in which the expansion of the universe is understood as a decrumpling process, much like the one we know from polymeric surfaces. The dimension of space is then a dynamical real variable. The generalized Friedmann equation, derived from a Lagrangian, and the generalized equation of continuity for the matter content of the unive…
▽ More
Assuming a cellular structure for the space-time, we propose a model in which the expansion of the universe is understood as a decrumpling process, much like the one we know from polymeric surfaces. The dimension of space is then a dynamical real variable. The generalized Friedmann equation, derived from a Lagrangian, and the generalized equation of continuity for the matter content of the universe, give the dynamics of our model universe. This leads to an oscillatory non-singular model with two turning points for the dimension of space.
△ Less
Submitted 23 July, 1996;
originally announced July 1996.